Smartphone Forensics: A Proactive Investigation Scheme for Evidence Acquisition
暂无分享,去创建一个
Lilian Mitrou | Dimitris Gritzalis | Alexios Mylonas | Bill Tsoumas | Vasilis Meletiadis | D. Gritzalis | L. Mitrou | Alexios Mylonas | B. Tsoumas | Vasilis Meletiadis
[1] Sebastiaan H. von Solms,et al. A Multi-component View of Digital Forensics , 2010, 2010 International Conference on Availability, Reliability and Security.
[2] Lilian Mitrou,et al. Communications Data Retention: A Pandora’s Box for Rights and Liberties? , 2007 .
[3] Clive Blackwell. An Investigative Framework for Incident Analysis , 2011, IFIP Int. Conf. Digital Forensics.
[4] Vrizlynn L. L. Thing,et al. Live memory forensics of mobile phones , 2010, Digit. Investig..
[5] Brian Neil Levine,et al. Forensic Triage for Mobile Phones with DEC0DE , 2011, USENIX Security Symposium.
[6] Marcus K. Rogers,et al. Computer Forensics Field Triage Process Model , 2006, J. Digit. Forensics Secur. Law.
[7] Wiebke Abel. Agents, Trojans and tags: The next generation of investigators , 2009 .
[8] Farkhund Iqbal,et al. Speaker verification from partially encrypted compressed speech for forensic investigation , 2010, Digit. Investig..
[9] Gary C. Kessler,et al. The growing need for on-scene triage of mobile devices , 2010, Digit. Investig..
[10] Ricci S. C. Ieong,et al. FORZA - Digital forensics investigation framework that incorporate legal issues , 2006, Digit. Investig..
[11] Emiliano Miluzzo,et al. A survey of mobile phone sensing , 2010, IEEE Communications Magazine.
[12] Sean Morrissey,et al. iOS Forensic Analysis: for iPhone, iPad, and iPod touch , 2010 .
[13] Wayne Jansen,et al. Guidelines on Cell Phone Forensics , 2007 .
[14] Ian Brown. Regulation of converged communications surveillance , 2008 .
[15] Adam M. Gershowitz. The iPhone Meets the Fourth Amendment , 2008 .
[16] Andreas Wiebe. The new fundamental right to it security — First evaluation and comparative view at the U.S. , 2008, Datenschutz und Datensicherheit - DuD.
[17] John A. Zachman,et al. A Framework for Information Systems Architecture , 1987, IBM Syst. J..
[18] Theodore Tryfonas,et al. Acquiring volatile operating system data tools and techniques , 2008, OPSR.